CVE-2022-28623

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute SQL injection attacks against HPE IceWall SSO 10.0 certd component, potentially leading to unauthorized data access, modification, or system compromise. Organizations using HPE IceWall SSO 10.0 with the certd library on RHEL or HP-UX systems are affected.

💻 Affected Systems

Products:
  • HPE IceWall SSO
Versions: 10.0
Operating Systems: RHEL, HP-UX
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the certd library component. Other IceWall SSO components may not be affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise, data exfiltration, privilege escalation, and potential lateral movement within the network.

🟠

Likely Case

Unauthorized database access, data manipulation, and potential credential theft from the SSO system.

🟢

If Mitigated

Limited impact due to network segmentation, proper input validation, and restricted database permissions.

🌐 Internet-Facing: HIGH - Remote exploitation possible, CVSS 9.8 indicates critical severity for internet-facing systems.
🏢 Internal Only: HIGH - Even internal systems are vulnerable to authenticated or network-accessible attacks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities typically have low exploitation complexity once the attack vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patch 9 for certd library

Vendor Advisory: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbmu04330en_us

Restart Required: Yes

Instructions:

1. Download Patch 9 for your OS (RHEL or HP-UX) from HPE support. 2. Stop IceWall SSO services. 3. Apply the patch according to HPE documentation. 4. Restart IceWall SSO services. 5. Verify successful patch installation.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to IceWall SSO systems to only necessary IP addresses and services.

Web Application Firewall

all

Deploy WAF with SQL injection rules to block exploitation attempts.

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries at application layer
  • Isolate IceWall SSO systems in separate network segments with strict access controls

🔍 How to Verify

Check if Vulnerable:

Check IceWall SSO version and certd library version. If running version 10.0 without Patch 9, system is vulnerable.

Check Version:

Consult HPE IceWall SSO documentation for version checking commands specific to your OS installation.

Verify Fix Applied:

Verify that Patch 9 is installed by checking patch management system or running version check commands.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in application logs
  • Multiple failed authentication attempts
  • Unexpected database connections

Network Indicators:

  • SQL injection patterns in HTTP requests to IceWall SSO endpoints
  • Unusual outbound database connections

SIEM Query:

source="icewall_sso" AND (http_uri="*certd*" OR http_uri="*sso*") AND (http_query="*' OR *" OR http_query="*;--*" OR http_query="*UNION*" OR http_query="*SELECT*" OR http_query="*INSERT*")

🔗 References

📤 Share & Export